期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Locality-constrained framework for face alignment
1
作者 Jie ZHANG Xiaowei ZHAO +3 位作者 Meina KAN Shiguang SHAN Xiujuan CHAI Xilin CHEN 《中国计算机科学前沿:英文版》 SCIE EI CSCD 2019年第4期789-801,共13页
Although the conventional active appearance model (AAM) has achieved some success for face alignment, it still suffers from the generalization problem when be applied to unseen subjects and images. To deal with the ge... Although the conventional active appearance model (AAM) has achieved some success for face alignment, it still suffers from the generalization problem when be applied to unseen subjects and images. To deal with the gem eralization problem of AAM, we first reformulate the original AAM as sparsity-regularized AAM, which can achieve more compact/better shape and appearance priors by selecting nearest neighbors as the bases of the shape and appearance model. To speed up the fitting procedure, the sparsity in sparsity?regularized AAM is approximated by using the locality (i.e., AT-nearest neighbor), and thus inducing the locality-constrained active appearance model (LC-AAM). The LC-AAM solves a constrained AAM-like fitting problem with the K-nearest neighbors as the bases of shape and appearance model. To alleviate the adverse influence of inaccurate AT-nearest neighbor results, the locality constraint is further embedded in the discriminative fitting method denoted as LC-DFM, which can find better K-nearest neighbor results by employing shape-indexed feature, and can also tolerate some inaccurate neighbors benefited from the regression model rather than the generative model in AAM. Extensive experiments on several datasets demonstrate that our methods outperform the state-of-the-arts in both detection accuracy and generalization ability. 展开更多
关键词 locality-constrained AAM locality-constrained DFM face alignment sparsity-regularization
Spreading Social Influence with both Positive and Negative Opinions in Online Networks
2
作者 Jing(Selena)He Meng Han +2 位作者 Shouling Ji Tianyu Du Zhao Li 《大数据挖掘与分析(英文)》 2019年第2期100-117,共18页
Social networks are important media for spreading information, ideas, and influence among individuals.Most existing research focuses on understanding the characteristics of social networks, investigating how informati... Social networks are important media for spreading information, ideas, and influence among individuals.Most existing research focuses on understanding the characteristics of social networks, investigating how information is spread through the 'word-of-mouth' effect of social networks, or exploring social influences among individuals and groups. However, most studies ignore negative influences among individuals and groups. Motivated by the goal of alleviating social problems, such as drinking, smoking, and gambling, and influence-spreading problems, such as promoting new products, we consider positive and negative influences, and propose a new optimization problem called the Minimum-sized Positive Influential Node Set(MPINS) selection problem to identify the minimum set of influential nodes such that every node in the network can be positively influenced by these selected nodes with no less than a threshold of ?. Our contributions are threefold. First, we prove that, under the independent cascade model considering positive and negative influences, MPINS is APX-hard. Subsequently, we present a greedy approximation algorithm to address the MPINS selection problem. Finally, to validate the proposed greedy algorithm, we conduct extensive simulations and experiments on random graphs and seven different realworld data sets that represent small-, medium-, and large-scale networks. 展开更多
关键词 influence SPREAD social networks POSITIVE influential NODE set GREEDY algorithm POSITIVE and NEGATIVE influences
CATIRI:An Efficient Method for Content-and-Text Based Image Retrieval
3
作者 Mengqi Zeng Bin Yao +5 位作者 Zhi-Jie Wang Yanyan Shen Feifei Li Jianfeng Zhang Hao Lin Minyi Guo 《计算机科学技术学报:英文版》 SCIE EI CSCD 2019年第2期287-304,共18页
The combination of visual and textual information in image retrieval remarkably alleviates the semantic gap of traditional image retrieval methods,and thus it has attracted much attention recently.Image retrieval base... The combination of visual and textual information in image retrieval remarkably alleviates the semantic gap of traditional image retrieval methods,and thus it has attracted much attention recently.Image retrieval based on such a combination is usually called the content-and-text based image retrieval(CTBIR).Nevertheless,existing studies in CTBIR mainly make efforts on improving the retrieval quality.To the best of our knowledge,little attention has been focused on how to enhance the retrieval efficiency.Nowadays,image data is widespread and expanding rapidly in our daily life.Obviously,it is important and interesting to investigate the retrieval efficiency.To this end,this paper presents an efficient image retrieval method named CATIRI(content-and-text based image retrieval using indexing).CATIRI follows a three-phase solution framework that develops a new indexing structure called MHIM-tree.The MHIM-tree seamlessly integrates several elements including Manhattan Hashing,Inverted index,and M-tree.To use our MHIM-tree wisely in the query,we present a set of important metrics and reveal their inherent properties.Based on them,we develop a top-k query algorithm for CTBIR.Experimental results based on benchmark image datasets demonstrate that CATIRI outperforms the competitors by an order of magnitude. 展开更多
关键词 image RETRIEVAL text-and-visual feature INDEXING TOP-K
Crowdsourcing intelligent design
4
作者 Wei XIANG Ling-yun SUN +1 位作者 Wei-tao YOU Chang-yuan YANG 《信息与电子工程前沿:英文版》 SCIE EI CSCD 2018年第1期126-138,共13页
关键词 设计方法 人工智能 CAL 生产 学习
An adaptive system for detecting malicious queries in web attacks
5
作者 Ying DONG Yuqing ZHANG +4 位作者 Hua MA Qianru WU Qixu LIU Kai WANG Wenjie WANG 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2018年第3期171-186,共16页
网请求询问字符串(询问) 把参数传递给一个引用资源,被攻击者总是操作检索敏感数据并且甚至获得牺牲品网服务器和网应用程序的完整的控制。然而,存在在文学的恶意的质问察觉途径不能应付变化的网攻击。在这份报纸,我们介绍能适应地... 网请求询问字符串(询问) 把参数传递给一个引用资源,被攻击者总是操作检索敏感数据并且甚至获得牺牲品网服务器和网应用程序的完整的控制。然而,存在在文学的恶意的质问察觉途径不能应付变化的网攻击。在这份报纸,我们介绍能适应地检测基于万维网的代码注射攻击的一个新奇适应系统(AMOD ) ,它是网攻击的多数,由分析询问。我们也介绍新适应学习策略,叫的 SVM 混血儿,由我们的系统利用了最小化用手的工作。在评估,一个新察觉模型在从研究所网服务者记载的一个大学教师收集的十天的质问数据集上被训练。评估证明我们的途径在二尊重压到存在途径。第一, AMOD 与 99.50% 的 F 值和 0.001% 的 FP 率超过存在的网攻击察觉方法。第二, SVM 混血儿获得的恶意的询问的全部的数字是由流行支持向量用机器制造适应学习的 3.07 次(SVM AL ) 方法。获得的恶意的询问能被用来更新网应用程序防火墙(空军妇女队成员) 签名图书馆。 展开更多
关键词 攻击检测 询问 系统 应用程序 学习策略 参数传递 敏感数据 机器制造
PSVM: a preference-enhanced SVM model using preference data for classification
6
作者 Lerong MA Dandan SONG +1 位作者 Lejian LIAO Jingang WANG 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2017年第12期161-174,共14页
Classification is an essential task in data mining, machine learning and pattern recognition areas.Conventional classification models focus on distinctive samples from different categories. There are fine-grained diff... Classification is an essential task in data mining, machine learning and pattern recognition areas.Conventional classification models focus on distinctive samples from different categories. There are fine-grained differences between data instances within a particular category. These differences form the preference information that is essential for human learning, and, in our view, could also be helpful for classification models. In this paper, we propose a preference-enhanced support vector machine(PSVM), that incorporates preference-pair data as a specific type of supplementary information into SVM. Additionally, we propose a two-layer heuristic sampling method to obtain effective preference-pairs, and an extended sequential minimal optimization(SMO)algorithm to fit PSVM. To evaluate our model, we use the task of knowledge base acceleration-cumulative citation recommendation(KBA-CCR) on the TREC-KBA-2012 dataset and seven other datasets from UCI,Stat Lib and mldata.org. The experimental results show that our proposed PSVM exhibits high performance with official evaluation metrics. 展开更多
Evolution of Cloud Operating System: From Technology to Ecosystem
7
作者 Zuo-Ning Chen Kang Chen +9 位作者 Jin-Lei Jiang Lu-Fei Zhang Song Wu Zheng-Wei Qi Chun-Ming Hu Yong-Wei Wu Yu-Zhong Sun Hong Tang Ao-Bing Sun Zi-Lu Kang 《计算机科学技术学报:英文版》 SCIE EI CSCD 2017年第2期224-241,共18页
云操作系统(云 OS ) 被用于管理云资源以便他们能有效地并且高效地被使用。并且另外为用户和应用程序提供方便接口是云 OS 的责任。然而,因为方便抽象通常需要更多的计算资源,这二个目标经常正在冲突。因此,云 OS 有它为支持云应用... 云操作系统(云 OS ) 被用于管理云资源以便他们能有效地并且高效地被使用。并且另外为用户和应用程序提供方便接口是云 OS 的责任。然而,因为方便抽象通常需要更多的计算资源,这二个目标经常正在冲突。因此,云 OS 有它为支持云应用程序的各种各样的类型安排的资源管理和任务的自己的特征。云 OS 的进化被这二个经常冲突的目标事实上驾驶并且发现权利在他们之间的折衷做进化的每个阶段发生。在这份报纸,我们从三个不同方面调查了云 OS 进化的方法:创新技术进化, OS 建筑学进化和云生态系统进化。我们表演那发现适当 API (应用程序编程接口) 为下一个是批评的云 OS 的阶段进化。方便接口需要到没有苛责,被提供效率 API 什么时候被选择。我们在场一驾驶 API 遮蔽 OS 实践,为开发更好的云 OS 并且帮助健康地造并且跑云生态系统显示出 API 的大能力。 展开更多
关键词 遮蔽计算 操作系统 建筑学进化 虚拟化 云生态系统
E-commerce business model mining and prediction
8
作者 Zhou-zhou HE Zhong-fei ZHANG +1 位作者 Chun-ming CHEN Zheng-gang WANG 《信息与电子工程前沿:英文版》 SCIE EI CSCD 2015年第9期707-719,共13页
Let Globalization Benefit 80% of SMEs 预览
9
作者 Jack Ma 《中国对外贸易:英文版》 2016年第5期20-,共1页
<正>The world needs free trade,as we need more job positions.All issues brought by globalization are just our growing pains.In my opinion,globalization is not a threat to our economy and employment.On the contra... <正>The world needs free trade,as we need more job positions.All issues brought by globalization are just our growing pains.In my opinion,globalization is not a threat to our economy and employment.On the contrary,it will create more job po- 展开更多
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部 意见反馈